Debian Patches
Status for spamassassin/4.0.2-3
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| 10_change_config_paths | =================================================================== | no | ||||
| 20_edit_spamc_pod | =================================================================== | no | ||||
| 55_disable_nagios_epm | =================================================================== | no | ||||
| 90_pod_cleanup | =================================================================== | no | ||||
| debian_gitignore | =================================================================== | no | ||||
| bug426031-pod-fix | Update site-specific configuration path in man page In Debian, there is exactly one site-specific configuration directory, and it is known in advance. So we can safely remove the list of possible paths from the man page in order to avoid confusion. |
Noah Meyerhans <noahm@debian.org> | not-needed | debian | ||
| skip_config_tree_recurse_test | Skip config_tree_recurse test The default behavior of File::Find will automatically untaint directories with "safe" names. The '~' (tilde) character is not considered a safe name. Because Debian source package names use '~' to denote pre-release versions, the test will fail with a message similar to the following: . t/config_tree_recurse.t ........... _get_cf_pre_files_in_dir error: directory /home/admin/spamassassin-3.4.3~rc6+1/t/log/localrules.tmp is still tainted at /usr/share/perl/5.30/File/Find.pm line 558. at ../lib/Mail/SpamAssassin.pm line 2096. . The solution to this is either to modify lib/Mail/SpamAssassin.pm to consider '~' a safe character, or skip the test altogether. Because the former would impact all installations, and the latter is limited to test coverage, we will skip the test. |
Noah Meyerhans <noahm@debian.org> | not-needed | |||
| use_utf8_encoding.patch | =================================================================== | no | ||||
| add-ip-configuration-debug.patch | Add some debug output to tests Tests are failing on Debian buildd hosts with IPv6-only network configuration. However, I've been unable to reproduce this outside the buildd environment. Adding some debugging output to try to collect more details. . This patch can be dropped when the sitution is resolved. =================================================================== |
not-needed | ||||
| spamd_disable_ai_addrconfig_for_ipv4_literals.patch | Disable AI_ADDRCONFIG when passing IPv4 literals to getaddrinfo AI_ADDRCONFIG skips the loopback interface, but if it's the only one with IPv4 addresses configured, then it won't be returned by getaddrinfo and spamd won't end up listening anywhere. . =================================================================== |
no | debian | |||
| disable_spamd_client.patch | Disable spamd_client.t as it's not reliable enough =================================================================== |
Santiago Vila <sanvila@debian.org> | no | debian | 2025-05-04 | |
| improve-CNAME-caching.patch | improve CNAME caching | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-03 | ||
| limit-CNAME-cache-to-10-entries-by-default-and-make-it.patch | limit CNAME cache to 10 entries by default and make it configurable increase speed processing when there are a huge number of uris | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-03 | ||
| skip-CNAME-checks-if-dns_max_cname_cache-==-0.patch | skip CNAME checks if dns_max_cname_cache == 0 | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-05 | ||
| uri_list-test-requires-network-access.patch | uri_list test requires network access | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-05 | ||
| check_that_is_possible_to_verify_if_the_DNS_answer_is_a_CNAME.patch | check that is possible to verify if the DNS answer is a CNAME bz #8353 | Giovanni Bechis <gbechis@apache.org> | no | debian | 2025-10-13 | |
| set_dns_max_cname_cache.patch | =================================================================== | no | ||||
| 4.0.2+/0001-remove-additional-slashes-after-http.patch | remove additional slashes after http:// | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-02 | ||
| 4.0.2+/0002-add-has_dns_max_cname_cache-feature.patch | add has_dns_max_cname_cache feature | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-03 | ||
| 4.0.2+/0003-find-more-redirected-domains.patch | find more redirected domains | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-05 | ||
| 4.0.2+/0004-Bug-8351-Remove-invalid-import.patch | Bug 8351: Remove invalid import | Kent Oyer <fkento@apache.org> | no | 2025-09-15 | ||
| 4.0.2+/0005-Include-SVG-files-in-rawbody-rules.patch | Include SVG files in rawbody rules SVG files can contain text, html, and JavaScript so treat them just like html files. |
Kent Oyer <fkento@apache.org> | no | 2025-09-15 | ||
| 4.0.2+/0006-improve-received-headers-parser.patch | improve received headers parser | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-16 | ||
| 4.0.2+/0007-improve-rcvd-parser-for-some-Qmail-headers.patch | improve rcvd parser for some Qmail headers | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-26 | ||
| 4.0.2+/0008-in-order-to-hit-ARC_VALID-make-sure-that-all-ARC-Sea.patch | in order to hit ARC_VALID, make sure that all ARC-Seals pass, and the most recent ARC-Message-Signature passes bz #8352 | Giovanni Bechis <gbechis@apache.org> | no | 2025-09-26 | ||
| 4.0.2+/0009-return-early-if-the-new-url-has-an-unsupported-proto.patch | return early if the new url has an unsupported protocol | Giovanni Bechis <gbechis@apache.org> | no | 2025-10-01 | ||
| 4.0.2+/0011-Add-support-for-nested-anchor-tags.patch | Add support for nested anchor tags | Kent Oyer <fkento@apache.org> | no | 2025-10-15 | ||
| 4.0.2+/0012-remove-duplicated-parameters-in-order-to-better-catc.patch | remove duplicated parameters in order to better catch loops | Giovanni Bechis <gbechis@apache.org> | no | 2025-10-16 | ||
| 4.0.2+/0013-avoid-a-warning.patch | avoid a warning | Giovanni Bechis <gbechis@apache.org> | no | 2025-10-16 | ||
| 4.0.2+/0014-add-the-possibility-to-check-for-redirectors-using-S.patch | add the possibility to check for redirectors using Selenium this catches redirects that uses Javascript and other tricks | Giovanni Bechis <gbechis@apache.org> | no | 2025-10-22 | ||
| 4.0.2+/0015-fix-timeout-handling-in-Selenium-code.patch | fix timeout handling in Selenium code | Giovanni Bechis <gbechis@apache.org> | no | 2025-10-22 | ||
| 4.0.2+/0016-do-not-export-a-sub-that-has-been-removed-some-time-.patch | do not export a sub that has been removed some time ago | Giovanni Bechis <gbechis@apache.org> | no | 2025-11-11 | ||
| 4.0.2+/0017-log-Selenium-warnings.patch | log Selenium warnings | Giovanni Bechis <gbechis@apache.org> | no | 2025-12-02 | ||
| 4.0.2+/0018-make-it-possible-to-use-.-as-a-replacement-in-Mail-S.patch | make it possible to use \. as a replacement in Mail::SpamAssassin::Plugin::HashBL::check_hashbl_bodyre | Giovanni Bechis <gbechis@apache.org> | no | 2025-12-10 | ||
| 4.0.2+/0019-check-more-email-addresses-in-check_rbl_headers.patch | check more email addresses in check_rbl_headers | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-12 | ||
| 4.0.2+/0020-check-all-values-of-Reply-to-header.patch | check all values of Reply-to header | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-12 | ||
| 4.0.2+/0021-better-handling-of-malformed-uris.patch | better handling of malformed uris | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-13 | ||
| 4.0.2+/0022-add-support-for-4tld-domains-in-order-to-be-able-to-.patch | add support for 4tld domains in order to be able to query S3 endpoints in RBLs | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-14 | ||
| 4.0.2+/0023-fix-password-protected-Redis-access-with-legacy-conf.patch | fix password protected Redis access with legacy configuration bz #8362 | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-15 | ||
| 4.0.2+/0024-try-to-extract-more-urls-from-URIs.patch | try to extract more urls from URIs | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-26 | ||
| 4.0.2+/0025-Google-is-using-more-ipv6-ip-addresses-for-Gmail-rel.patch | Google is using more ipv6 ip addresses for Gmail relay, fix check accordingly | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-27 | ||
| 4.0.2+/0026-improve-redirection-checks-in-the-http-equiv-tag-cas.patch | improve redirection checks in the http-equiv tag case, silence a warning when using Selenium and fix regression tests | Giovanni Bechis <gbechis@apache.org> | no | 2026-01-28 | ||
| 4.0.2+/0027-extract-ip-addresses-from-new-Gmail-received-headers.patch | extract ip addresses from new Gmail received headers | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-03 | ||
| 4.0.2+/0028-if-the-host-is-an-octal-number-try-to-convert-it-int.patch | if the host is an octal number try to convert it into an ip address | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-05 | ||
| 4.0.2+/0029-return-early-if-the-host-is-not-valid.patch | return early if the host is not valid | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-05 | ||
| 4.0.2+/0030-add-empty_tags-configuration.patch | add "empty_tags" configuration. This is a list of tags that might be undefined because they are set by 3rd party plugins. Setting this configuration will prevent those tags from being set with an invalid value if they are not defined. |
Giovanni Bechis <gbechis@apache.org> | no | 2026-02-12 | ||
| 4.0.2+/0031-define-empty_tags-as-an-empty-string-by-default.patch | define empty_tags as an empty string by default | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-12 | ||
| 4.0.2+/0032-add-a-generic-url-extractor.patch | add a generic url extractor | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-12 | ||
| 4.0.2+/0033-revert-r1931682-and-add-a-working-test-for-the-case.patch | revert r1931682 and add a working test for the case fix #8366 | Giovanni Bechis <gbechis@apache.org> | no | 2026-02-13 | ||
| 4.0.2+/rules-20260212.patch | =================================================================== | no |
All known versions for source package 'spamassassin'
- 4.0.2-3 (sid)
- 4.0.2-2 (forky)
- 4.0.1-5 (trixie)
- 4.0.1-1~deb12u1 (bookworm)
